Resubmissions

10-10-2024 13:28

241010-qqpb5sxfle 10

10-10-2024 13:25

241010-qnxwhaxemd 10

10-10-2024 13:19

241010-qkwt2asfrm 10

10-10-2024 13:14

241010-qg5mrsxcmh 10

Analysis

  • max time kernel
    264s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 13:19

General

  • Target

    malw.exe

  • Size

    751KB

  • MD5

    cd4ee0d6ce4f0fcc5105b1601946d94c

  • SHA1

    a1b22767415d6230e9f2442f75b64a948759b8f2

  • SHA256

    000948ea48835dd2fe087ca6b042eabbf280ac93fe2eb94558995a3a9db0b8a9

  • SHA512

    2565e81816c7896db100e5ade16f456c76ee9b711d672711845b89d578a767077836510185fd605db3eefcdf1a1ced3a56e409bfae42f4f3f954d4f1ebaee5b5

  • SSDEEP

    12288:v39mEqOVzmIJnfTu6EKrVwTBbHsot5ZeVK7EWWlPYnlMWn:vIEqE6sTxBwBtve0WRnW

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t18n

Decoy

tmusicoregon.net

atici.online

j7u7.xyz

iewunucierwuerwnziqi1.info

ruvabetgiris.website

acik.lat

obsk.top

sphaltpaving-ttp1-shd-us-2.shop

ispensarynearme.news

b3nd.bond

urelook.xyz

gearlpfbm.top

aconstructionjob.bond

killsnexis.info

oshon.xyz

ashabsxw.top

ussiatraiding.buzz

raipsehumus.homes

6ae23rx.forum

edar88vvip.shop

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Users\Admin\AppData\Local\Temp\malw.exe
      "C:\Users\Admin\AppData\Local\Temp\malw.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\malw.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5072
      • C:\Users\Admin\AppData\Local\Temp\malw.exe
        "C:\Users\Admin\AppData\Local\Temp\malw.exe"
        3⤵
          PID:2120
        • C:\Users\Admin\AppData\Local\Temp\malw.exe
          "C:\Users\Admin\AppData\Local\Temp\malw.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3672
      • C:\Windows\SysWOW64\mstsc.exe
        "C:\Windows\SysWOW64\mstsc.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1468
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\malw.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2756
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        2⤵
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5020
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffede36cc40,0x7ffede36cc4c,0x7ffede36cc58
          3⤵
            PID:4444
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:2
            3⤵
              PID:2088
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:3
              3⤵
                PID:3596
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2416 /prefetch:8
                3⤵
                  PID:4688
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                  3⤵
                    PID:3372
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:1
                    3⤵
                      PID:2288
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3740,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:1
                      3⤵
                        PID:5056
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:8
                        3⤵
                          PID:1868
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4948 /prefetch:8
                          3⤵
                            PID:4772
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5060 /prefetch:8
                            3⤵
                              PID:2632
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:8
                              3⤵
                                PID:4976
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4852,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4832 /prefetch:1
                                3⤵
                                  PID:3944
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5264,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5284 /prefetch:1
                                  3⤵
                                    PID:4920
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5464,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:1
                                    3⤵
                                      PID:3132
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3208,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:8
                                      3⤵
                                        PID:5008
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5456,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5272 /prefetch:8
                                        3⤵
                                          PID:4104
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3176,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                                          3⤵
                                            PID:3572
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3280,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3572 /prefetch:1
                                            3⤵
                                              PID:3992
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,16825083162473470939,15372752539128371824,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:8
                                              3⤵
                                              • Modifies registry class
                                              PID:968
                                          • C:\Windows\system32\taskmgr.exe
                                            "C:\Windows\system32\taskmgr.exe" /4
                                            2⤵
                                            • Checks SCSI registry key(s)
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:3888
                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                          1⤵
                                            PID:2552
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                            1⤵
                                              PID:5064
                                            • C:\Windows\system32\werfault.exe
                                              werfault.exe /h /shared Global\45ea903517594eaaa0e2c9b8b4e44c86 /t 744 /p 5020
                                              1⤵
                                                PID:3884
                                              • C:\Windows\system32\AUDIODG.EXE
                                                C:\Windows\system32\AUDIODG.EXE 0x33c 0x49c
                                                1⤵
                                                  PID:2168
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                                  1⤵
                                                    PID:2560
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:4336

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      b2c312f0351e806fea8f1b5742c6c4c3

                                                      SHA1

                                                      c7359aa686409af42cfcd44f8c17814c1892815e

                                                      SHA256

                                                      e36a47865d825c35f2a65d21e12f28e79adfd0154a8874d2b0c97e5df4f4d3ab

                                                      SHA512

                                                      febd0be108860b743938c3171c9b8b2b7fc4f6004b465cadfab2125988eb70a662e2e8ea00078ce94184acc01c4a2f11043d80c38ffd7ffa251d1377a043239e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      13f5f10aa9f9c02dabfe776a0f61cb4f

                                                      SHA1

                                                      1e6f521bfb2698905bf8cf09877a6b15ac4d4ffe

                                                      SHA256

                                                      7f8f6245ee7aa58347d71faa6ec5af554ec638ca2c74641b617f24cc6bab84fa

                                                      SHA512

                                                      dc89b53bcc050036e0683a745dec1977fcd53d5e06ae2e974c475f339fac323fcb166a63f6064f00eadcdcdfd77009522917ac0746ad896dd52291ff25f7a49c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      26d2f61c2ac6aba9243835bb9b1f0b45

                                                      SHA1

                                                      a19cfbfd9ddb2cbbd9635272a8d423e905676cd2

                                                      SHA256

                                                      230a04bc53e50deb25963333ab7e0f8a7f465970608cfeb8aa46ca8583b3ed67

                                                      SHA512

                                                      ee95d8f5675dee1bc628a406404c609b9110ff39510ac5f204314a53ca0dcecad976a5a8c5832d80eea3b5ce78329ab3618a23c29eef0c1145d48c73a97ac443

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      28e870c8f1b985a5270d0ccbb1acbc46

                                                      SHA1

                                                      d7e2a438dd36a42b4fb7791f38e8efbbcd3f2458

                                                      SHA256

                                                      a5a36ad05c53fba7f3d3a00ad7d3479f70b3e2db5050208858788a0de940b371

                                                      SHA512

                                                      8d669a2a6c14d3dc65b77725734d8232e2f6dceb7644780553a86975a8cdb385d28dc42c7db7f461fe5d7140b78002e87ec0bc7c769429f3b07c246780fb321b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      64463f2dd1c3d8cd848fb79d9ad33323

                                                      SHA1

                                                      2df0e27f05919ca5485975cf4ed485a1c38bbc2c

                                                      SHA256

                                                      771307dfa1a62d90c91bc3bfe414da054a2862d7e7e57596ca96e0d2017ff47b

                                                      SHA512

                                                      842bf6527948d2ae8523eabbfbafefbff777f126016f70335e1a8ffd866628e381bc915d53431633b917fd34c46003cc43e036e33f9fb1a8f03d0f4c7e559612

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      356B

                                                      MD5

                                                      1350e7692e12f26b7d8d88df76f86db2

                                                      SHA1

                                                      2c28a2ff378ef1ce262a9c03952c8eaca12e77b2

                                                      SHA256

                                                      3f0e8e4f49a6454ba82950a419642568d832196c6a768ac91a0cd3e47afc80ef

                                                      SHA512

                                                      bf30e593e13d1f3307b2b0097220d5063d36f667ebdff198d44ad06d8776f96f3c08e97136d0fc5e856c5cf3e8712f5dacd9f643edda5adea25b3af06ba15cae

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      8KB

                                                      MD5

                                                      1c2398feb257c2e4204d3def68db90e2

                                                      SHA1

                                                      bd6075c41cdd14725bf8b24cc0c845b1bfc10af8

                                                      SHA256

                                                      2f02151185d0a6a99bd2236eb916d16a351addb0c80ce79d43f25e525cd588d1

                                                      SHA512

                                                      adc04b9cee843fd32a9a29d743bc4e367c17e4b9e66b2f934584a7615998c68b422635c22e976b3553053ca2159b6b50d5ac641c44e8dce1513da41179405b66

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      1740aa883acb2fdd6aaa2203592a0ec8

                                                      SHA1

                                                      57c48d1e476eb139b7b1e84b2d0eabc3ad3eb687

                                                      SHA256

                                                      1ac49dde6a426687467a4883e5bbbcea4d1164ebb4db3003717479720aa53a2a

                                                      SHA512

                                                      223883f50206cd02ae27ac28eeff5acee6ecc2c7fb1c182cb17a9957945ceef1f4ad20a80384cf4dbee7bc80a883099ea2a254c3d1ee9f072a0cfe976108c29c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      59ae405ee9a51a61059a252dc3099381

                                                      SHA1

                                                      b786c3d79f769f10751abefa2b1b921ce434baec

                                                      SHA256

                                                      4a9b236e5911b027018ab15df626d73bca953b35854287586fea94abc53a527b

                                                      SHA512

                                                      d303cfa6be3f424d100ab2044d63301b638419cc133349e7a34645f3a3090d1dda5ee326c18381bf33e6bd5114fabf720f819181272a6bae96258da81f2ff33a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      10670ba02971abd67499553901d1a476

                                                      SHA1

                                                      322afc6fff6b93fdb1da818379bbefc10010fdb4

                                                      SHA256

                                                      a83680472eabfff5b62dfc5d4f3fb52e31bf45658353e69f1956853ad80a2f6e

                                                      SHA512

                                                      03da93fb7923c643046d9e07de480a9b82cd05f49ecec2d5282757e37c76710cd35e678d030b7cb76adfb795db7e501f19865f8d0d7aae0d3999eef3c7353f07

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      1e28101367c0aab90d62c048e8d4fad3

                                                      SHA1

                                                      15abb40a98cd5230904ea819032010b8b58ca942

                                                      SHA256

                                                      c3005bf26cd32c502295116989a97ff7b00c5bac760a6a9639605edc5342c98b

                                                      SHA512

                                                      0ab244ae8b79e0de64d4e9cf46e15b801299797754f8915d4b3362beca62239b1e3e868469256ac5256b4c0d28c008e359ad44e611e418b4ccfa09c80078dfb4

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      228KB

                                                      MD5

                                                      0e81f245c519fe9d9b5b878297dc3675

                                                      SHA1

                                                      6deaa459677e2d1bcc5be396c80f7173e805a14d

                                                      SHA256

                                                      43463172b733d602cd89b2d2eb9b5bd72813e9bd46e787da0266c538fe0369c9

                                                      SHA512

                                                      862549e666c2d5fa102afa2523351cb6160a86e5261e7b56a390e51f05dc8a6a8c43eafcd14746b1b049d445709cae9ca8778e46494edf908073c372d09e2e54

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      228KB

                                                      MD5

                                                      7648ba201e36da1daffcf26eb705e6ba

                                                      SHA1

                                                      d118969f75578dcebc890f23755b0878fb55cb2a

                                                      SHA256

                                                      c7af7d5020c1950db22c907883dca7e00bf03430da1749c34d8b469ef028d671

                                                      SHA512

                                                      35dc254327beb34305311dda9ad9a5231d6afe57110d6ab140fa25e15e977c28b88d0438924b8a2ceba74024fa52da752cc7fde64f3eba79bd937ccfd1538fea

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      228KB

                                                      MD5

                                                      5890dd40fd2048b04a41d557ddcffb94

                                                      SHA1

                                                      0d24a87bac29e68c0b07e869c7ba4cf77854a4c5

                                                      SHA256

                                                      605098cc992502cc6eabff7bf4093d4e3e34c98ff087dc132e74e721a00f730c

                                                      SHA512

                                                      914aa84f7bda64a4c0e259579b66e7f9c3d332ecb0465b6c3f37595d18f355894dd57e0a14612bba3020c0b6e15e0904413649a593c198f6cb7213f2e60757be

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      714dc648ddfe4f923d81eeca035d2f2e

                                                      SHA1

                                                      d95cc7a4ae23889a567a7d8c7b28ee9c12e895e2

                                                      SHA256

                                                      990ff8d7525f7d090bf64cc6f56834d8fc62f7d51ba41f1fb1e5bf3b6e2e1763

                                                      SHA512

                                                      163d28fd03acdd2e978d556012590d4ed0b93114d9eed407674a8c62dbd9acb41f62819fc6ea26218cb4b33e85b9628baea6170dbecffaa54473a031a984ffa0

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hp5uq1sy.2lo.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                      Filesize

                                                      2B

                                                      MD5

                                                      f3b25701fe362ec84616a93a45ce9998

                                                      SHA1

                                                      d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                      SHA256

                                                      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                      SHA512

                                                      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                    • memory/1468-73-0x0000000000550000-0x000000000057F000-memory.dmp

                                                      Filesize

                                                      188KB

                                                    • memory/1468-72-0x00000000003C0000-0x00000000004FA000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/1468-70-0x00000000003C0000-0x00000000004FA000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2024-10-0x000000000A9E0000-0x000000000AA7C000-memory.dmp

                                                      Filesize

                                                      624KB

                                                    • memory/2024-5-0x0000000074D70000-0x0000000075520000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/2024-1-0x0000000000FF0000-0x00000000010B2000-memory.dmp

                                                      Filesize

                                                      776KB

                                                    • memory/2024-2-0x0000000006130000-0x00000000066D4000-memory.dmp

                                                      Filesize

                                                      5.6MB

                                                    • memory/2024-3-0x0000000005A90000-0x0000000005B22000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/2024-4-0x0000000005B60000-0x0000000005B6A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/2024-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2024-13-0x0000000074D70000-0x0000000075520000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/2024-6-0x00000000060E0000-0x00000000060F8000-memory.dmp

                                                      Filesize

                                                      96KB

                                                    • memory/2024-9-0x0000000006EC0000-0x0000000006F36000-memory.dmp

                                                      Filesize

                                                      472KB

                                                    • memory/2024-8-0x0000000074D70000-0x0000000075520000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/2024-7-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2560-550-0x000002083AD50000-0x000002083AD60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2560-534-0x000002083AC50000-0x000002083AC60000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/3452-69-0x0000000007480000-0x0000000007541000-memory.dmp

                                                      Filesize

                                                      772KB

                                                    • memory/3452-18-0x0000000002D50000-0x0000000002E44000-memory.dmp

                                                      Filesize

                                                      976KB

                                                    • memory/3452-77-0x0000000008430000-0x000000000851B000-memory.dmp

                                                      Filesize

                                                      940KB

                                                    • memory/3452-74-0x0000000007480000-0x0000000007541000-memory.dmp

                                                      Filesize

                                                      772KB

                                                    • memory/3672-14-0x0000000001220000-0x000000000156A000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/3672-68-0x00000000010F0000-0x0000000001104000-memory.dmp

                                                      Filesize

                                                      80KB

                                                    • memory/3672-11-0x0000000000400000-0x000000000042F000-memory.dmp

                                                      Filesize

                                                      188KB

                                                    • memory/3672-17-0x00000000010B0000-0x00000000010C4000-memory.dmp

                                                      Filesize

                                                      80KB

                                                    • memory/3672-16-0x0000000000400000-0x000000000042F000-memory.dmp

                                                      Filesize

                                                      188KB

                                                    • memory/3672-67-0x0000000000400000-0x000000000042F000-memory.dmp

                                                      Filesize

                                                      188KB

                                                    • memory/3888-130-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-131-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-129-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-128-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-127-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-122-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-126-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-121-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-132-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3888-120-0x000001D7F58A0000-0x000001D7F58A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/5072-22-0x0000000004C80000-0x00000000052A8000-memory.dmp

                                                      Filesize

                                                      6.2MB

                                                    • memory/5072-65-0x0000000074E10000-0x00000000755C0000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5072-62-0x0000000007140000-0x0000000007148000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5072-61-0x0000000007160000-0x000000000717A000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/5072-60-0x0000000007060000-0x0000000007074000-memory.dmp

                                                      Filesize

                                                      80KB

                                                    • memory/5072-59-0x0000000007050000-0x000000000705E000-memory.dmp

                                                      Filesize

                                                      56KB

                                                    • memory/5072-58-0x0000000007020000-0x0000000007031000-memory.dmp

                                                      Filesize

                                                      68KB

                                                    • memory/5072-57-0x00000000070A0000-0x0000000007136000-memory.dmp

                                                      Filesize

                                                      600KB

                                                    • memory/5072-56-0x0000000006E90000-0x0000000006E9A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/5072-55-0x0000000006E20000-0x0000000006E3A000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/5072-54-0x0000000007470000-0x0000000007AEA000-memory.dmp

                                                      Filesize

                                                      6.5MB

                                                    • memory/5072-52-0x0000000074E10000-0x00000000755C0000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5072-53-0x0000000006AE0000-0x0000000006B83000-memory.dmp

                                                      Filesize

                                                      652KB

                                                    • memory/5072-51-0x00000000060B0000-0x00000000060CE000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/5072-39-0x0000000006AA0000-0x0000000006AD2000-memory.dmp

                                                      Filesize

                                                      200KB

                                                    • memory/5072-40-0x0000000070C30000-0x0000000070C7C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/5072-41-0x0000000074E10000-0x00000000755C0000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5072-38-0x0000000005B00000-0x0000000005B4C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/5072-37-0x0000000005AE0000-0x0000000005AFE000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/5072-32-0x0000000005510000-0x0000000005864000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/5072-23-0x0000000004A30000-0x0000000004A52000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/5072-26-0x0000000074E10000-0x00000000755C0000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5072-25-0x00000000054A0000-0x0000000005506000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/5072-24-0x0000000004BD0000-0x0000000004C36000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/5072-19-0x0000000074E1E000-0x0000000074E1F000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/5072-20-0x0000000002200000-0x0000000002236000-memory.dmp

                                                      Filesize

                                                      216KB

                                                    • memory/5072-21-0x0000000074E10000-0x00000000755C0000-memory.dmp

                                                      Filesize

                                                      7.7MB